Download presentation
Presentation is loading. Please wait.
Published byJemimah White Modified over 8 years ago
1
Privacy and Contextual Integrity: Framework and Applications Adam Barth, Anupam Datta, John C. Mitchell (Stanford) Helen Nissenbaum (NYU)
2
Privacy in Health Care Patient DoctorSpecialist Electronic Health Record Patient Portal Insurer HIPAA Compliance
3
Broad Goal Protect privacy –Can a banker tell a marketer a customer’s address? Express policy precisely –Enterprise privacy policies –Privacy provisions from legislation Analyze privacy policies –Action complies with policy? –Policy enforces law?
4
Approach Privacy model –Agents communicating about each other Logic over model –Linear temporal logic Policies as logical formulas –Control expressive power Apply logical tools –Leverage LTL research
5
Contextual Integrity Philosophical account of privacy –Transfer of personal information –Describes what people care about Flow governed by norms –Agents act in roles in social contexts –Rejects public/private dichotomy Principles of transmission –Confidentiality, reciprocity, dessert, etc
6
Privacy Model for CI AliceBob Charlie’s SSN is 078-05-1120 Restrict messages –Messages about subjects Judgments over traces –Past and future relevant Agents reason about attributes
7
Access Control vs. Privacy Access control –Subject (= actor) –Object –Action Stateless –Except Chinese wall Discrete elements Privacy policies –Sender –Recipient –Subject (of message) –Attribute –Transmission principle Temporal –Past: Opt-in / opt-out –Future: Notification Structured attributes
8
Syntax Grammar for logic – ::= send(p 1,p 2,m)p 1 sends p 2 message m | contains(m, q, t)m contains attrib t about q | inrole(p, r)p is active in role r | incontext(p, c)p is active in context c | t t’Attrib t is part of attrib t’ | | | x: . Classical operators | U | S | O Temporal operators Policies use a restricted class of formulas
9
CI Norms and Policies Policy consists of norms (+)inrole(p 1, r 1 ) inrole(p 2, r 2 ) inrole(q, r) t t’ ( )inrole(p 1, r 1 ) inrole(p 2, r 2 ) inrole(q, r) t t’ – is an agent constraint – is a temporal condition Norms assembled into policy formula – p 1,p 2,q:P. m:M. t:T.incontext(p 1, c) send(p 1, p 2, m) contains(m, q, t) { + | + norms + (c) } { | norms (c) }
10
Sender roleSubject roleAttribute Transmission principle Gramm-Leach-Bliley Example Recipient role Financial institutions must notify consumers if they share their non-public personal information with non- affiliated companies, but the notification may occur either before or after the information sharing occurs
11
Expressiveness of CI Evaluated on privacy laws –HIPAA, GLBA, and COPPA Captured most privacy provisions –Missed de-identified health info in HIPAA Laws used most features –Roughly as expressive as required
12
Structure of Attributes Health Information Psychotherapy Notes Date of Birth AgeZodiac SignTest Results Heath care providers can tell patients their health information Heath care providers can tell patients their psychotherapy notes only if a psychiatrist has approved Sender roleRecipient roleSubject roleAttribute Health Information Psychotherapy NotesTest Results Health Information Psychotherapy Notes
13
Extensional vs. Intentional Extensional semantics –Equates policies with judgments –Ignores why judgments reached Intentional semantics –Policies as list of rules –Reason for judgment preserved Extensional combination tricky –Attribute inheritance
14
Difficulties in Combination Date of Birth AgeZodiac Sign Age AND= Date of Birth AgeZodiac Sign Date of Birth AgeZodiac Sign Age OR= Date of Birth AgeZodiac Sign Date of Birth
15
Refinement and Combination Policy refinement –Basic policy relation –Does hospital policy enforce HIPAA? P 1 refines P 2 if P 1 P 2 –Requires careful handling of attribute inheritance Combination becomes logical conjunction –Defined in terms of refinement
16
Compliance Strong compliance –Future requirements after action can be met –PSPACE Weak compliance –Present requirements met by action –Polynomial time Policy History Contemplated Action Judgment Future Reqs
17
Related Languages ModelSenderRecipientSubjectAttributesPastFutureCombination RBACRoleIdentity XACMLFlexible o o EPALFixedRoleFixed o P3PFixedRoleFixed o o CIRole Legend: unsupported opartially supported full supported CI fully supports attributes and combination
18
Conclusions Privacy about agents communicating –Different model than access control Sender, recipient, subject, attribute, transmission principle –Past and future important CI: A language for privacy policies –Based on linear temporal logic –Expresses most privacy laws Combination and compliance tractable
19
Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.